<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=2528533714139722&amp;ev=PageView&amp;noscript=1">
New call-to-action
be-page-banner (1)

Welcome to CIONET Belgium

Realise your ambition! Connect with your local community of digital leaders.

See what's next

Upcoming Events

 
Banner

Belgium 9-10-25 Country Members Physical english

Belgium's Got Talent '25 - CIONET Belgium: Community Event

Today’s IT world moves faster than ever. New tools, new ways of working, constant updates!  The real challenge? Making sure your people stay in the loop, up to speed, and ready to move. That’s why this year’s edition of Belgium’s Got Digital Talent is all about mastering knowledge flow, how to share the right know-how with the right people, at the right time. No more teams working in silos. No more vital info getting lost.We’re diving into practical ways to keep your teams smart, agile, and aligned. Whether you're leading an IT team, shaping digital strategy, or hiring tech talent, this event will give you the ideas, tools, and energy to turn fast change into a competitive edge.

Read More
Banner

Belgium 14-10-25 Squad Only Virtual english

Agile Infrastructure ; How to build technical foundations that don’t slow you down

Agile delivery often collides with inflexible infrastructures. One team wants to release weekly. Another is waiting six months for a new test environment. Sounds familiar? If your infra team is tired of being the bottleneck, and your devs are tired of waiting, this session opens a path forward.

Read More
Banner

Belgium 14-10-25 Invitation Only Physical english

Towards Digital Sovereignty in the Financial Sector

For financial institutions, a strategic approach to cloud adoption is needed, but not simple to achieve. The challenge lies in leveraging the benefits of modern cloud infrastructure while simultaneously preparing to meet strict sovereignty requirements. This necessitates a careful consideration of cloud architecture, including hybrid and multi-cloud models, and a thorough understanding of data residency and governance.

Read More

Upcoming TRIBE Events

 
Banner

October 14, 2025 Squad Session Squad Only Virtual english

Agile Infrastructure ; How to build technical foundations that don’t slow you down

Agile delivery often collides with inflexible infrastructures. One team wants to release weekly. Another is waiting six months for a new test environment. Sounds familiar? If your infra team is tired of being the bottleneck, and your devs are tired of waiting, this session opens a path forward.

Read More
Banner

October 17, 2025 Squad Session Squad Only Physical english

Leading Change When Your Organisation Pushes Back ; How to move forward when transformation feels like a threat

You’ve secured the budget. The tech is solid. Leadership has signed off. But the project’s going nowhere. People smile in meetings and ignore you afterwards. Middle managers hesitate. Teams follow the old way, even when a new one exists. Every step forward feels like a negotiation, because it is. You’re not alone. Many digital leaders find themselves in this position. The business knows it needs to change but isn’t ready to let go. This session is about those moments.

Read More
Banner

October 21, 2025 Squad Session Squad Only Physical english

AI in Practice ; What it really takes to move from pilot to production

Every organisation has a handful of AI pilots. But very few have scaled them. The models are accurate. The vision is clear. But something’s always in the way; lack of infrastructure, unclear ownership, security concerns, or just plain fatigue. This is a conversation for people in the messy middle of the AI journey, those navigating the leap from promising prototypes to operational value.

Read More

CIONET Partner Updates

CIONET Partner Updates

Recent Cases

Please Log In with your CIONET account first

How Atlassian Enforces Best Practices in Its Cloud Infrastructure

How Atlassian Enforces Best Practices in Its Cloud Infrastructure

INTRODUCTION

This is an updated version of an October 2019 post from the ATLASSIAN Community – How Atlassian enforces Best Practices in its Cloud Infrastructure. Link to original blog post.

The majority of Atlassian’s business runs on Amazon Web Services (AWS). Due to the large scale of our infrastructure, we allow for teams to manage their own changes without a centralised review. Atlassian operates on a “trust, but verify” model: We promote a set of best practices and guidelines for teams to follow and we then check that these best practices are being implemented. Where the target is missed, we help the team readjust.

The most widely known example are S3 buckets that are publicly available and can be accessed by anyone. Countless companies have been caught off guard by accidentally putting confidential information in public buckets. It has prompted Amazon to offer additional safeguards in the form of bucket-level overrides to deny any sort of public object, acknowledging the severity of this problem.

 

At Atlassian, we have added a new tool to our vulnerability management belt so we can assist teams in following the best practices we have established: Trend Micro Cloud One™ – Conformity which specialises in continuously scanning the configuration of cloud infrastructure.

While they offer support for multiple cloud providers as well as checks for all five pillars of the well-architected framework, we use the tool for its “Security” checks for AWS.

 
 
 

ADOPTION

Nearly all of our AWS accounts are being scanned on an hourly basis and the results are reported to the security team. To enable our developers to move fast and remove security as a gatekeeper we didn’t stop there, though. Instead, we integrated Cloud One - Conformity with our vulnerability pipeline which files Jira tickets for any findings we discover through these scans. Our developers live and breathe Jira day in, day out, so surfacing this information here is much more natural for them than having to look for these findings in some third party tool or needing security as an intermediary.

Anyone who has ever tried to deploy a security scanner inside an organisation knows that they are never set-and-forget. Instead, they require fine-tuning to ensure they only produce meaningful results. Every enterprise environment is different and particularly at scale, edge cases exist that scanners would not anticipate. For example, our internal PaaS enforces a set of best practices that have been developed in collaboration with the security team. Some of the configurations that come out of this are secure in this context, but the scanner will still report on them because they generally wouldn’t be. As a result, we spent some time refining the set of rules we care about.

In our first iteration, we decided to focus on our highest severity AWS accounts. These accounts hold our customers' data or manage our infrastructure, for example our CI/CD. In addition, we narrowed down the initial set of rules to those we consider high severity. We then spent some time working closely with those teams that own these important AWS accounts to ensure all findings provide a meaningful security benefit. Based on this feedback, we adjusted the configuration of our rules to fit right into our organisation. Only for this subset of accounts & rules are we creating Jira tickets, as we have verified the quality of these findings.

The next iteration has already started and is expanding out the scope of accounts having Jira tickets created as well as including more rules that are being reviewed. Eventually, all our AWS accounts will be under our security SLA and every check will have been reviewed and configured to the specifics of our environment.

We also continue working closely with the Conformity team, who are responsive to our feedback and quickly fix any bugs we discover in their product. They are great at including our feature requests in their roadmap and always keep us informed on when work is starting on anything we care about. This way, we keep increasing the value their service provides to us which directly translates into an ever increasing security posture.

When the security researcher “benmap” presented at DEF CON 27 recently, the community learned just how vulnerable public EBS volumes can leave a company, reminding everyone that not just S3 buckets can be made public and contain sensitive information. Naturally, we investigated our own environment for such public volumes. Since Conformity was already actively scanning all of our accounts, we were able to perform a fast investigation that gave a complete picture of all public volumes and we could quickly confirm that none of them contained any sensitive information. In addition, we will be alerted to any future volumes that are being made public and can ensure we are not exposing any sensitive information through them.

As a helpful side-effect these scans provide a forcing function for teams to go into their own environments and clean up any stale resources left over from development experiments. Atlassian enables our developers to iterate quickly, try out new features and innovate on our services. As a security team, we are responsible for making sure that these experiments happen within a suitable environment and in a way that don’t put customer data at risk. Part of this responsibility is making sure that unused resources are being cleaned up and Conformity helps us achieve this. We notify developers about resources with insecure configurations and sometimes developers realise they do not need those resources anymore and delete them.

 

With a tool like Trend Micro Cloud One - Conformity in our arsenal, we now have ongoing assurance that our cloud infrastructure is in a good and secure state.

We go beyond just vulnerabilities and use it to actually enforce best practices, which ensures our cloud security posture is best of breed.

CIONET Circles

CIONET Business Circles

Banner
Healthcare Circle

Digital Transformation is redefining the future of health care and health delivery. All stakeholders are convinced that these innovations will create value for patients, healthcare practitioners, hospitals, and governments along the patient pathway. The benefits are starting from prevention and awareness to diagnosis, treatment, short- and long-term follow-up, and ultimately survival. But how do you make sure that your working towards an architecturally sound, secure and interoperable health IT ecosystem for your hospital and avoid implementing a hodgepodge of spot solutions? How does your IT department work together with the other stakeholders, such as the doctors and other healthcare practitioners, Life Sciences companies, Tech companies, regulators and your internal governance and administrative bodies?

Read More
Banner
Telenet Business Leadership Circle

The Telenet Business Leadership Circle powered by CIONET, offers a platform where IT executives and thought leaders can meet to inspire each other and share best practices. We want to be a facilitator who helps you optimise the performance of your IT function and your business by embracing the endless opportunities that digital change brings.

Read More
Banner
Les Rencontres

Découvrez la dynamique du leadership numérique aux Rencontres de CIONET, le programme francophone exclusif de CIONET pour les leaders numériques en Belgique, rendu possible grâce au soutien et à l'engagement de nos partenaires de programme : Deloitte, Denodo et Red Hat. Rejoignez trois événements inspirants par an à Liège, Namur et en Brabant Wallon, où des CIOs et des experts numériques francophones de premier plan partagent leurs perspectives et expériences sur des thèmes d'affaires et de IT actuels. Laissez-vous inspirer et apprenez des meilleurs du secteur lors de sessions captivantes conçues spécialement pour soutenir et enrichir votre rôle en tant que CIO pair. Ne manquez pas cette opportunité de faire partie d'un réseau exceptionnel d'innovateurs numériques !

Read More
Banner
Female Leadership Circle

CIONET is committed to highlighting and celebrating female role models in IT, Tech & Digital, creating a leadership programme that empowers and elevates women within the tech industry. This initiative is dedicated to showcasing the achievements and successes of leading women, fostering an environment where female role models are recognised, and their contributions can ignite progress and inspire the next generation of women in IT. Our mission is to shine the spotlight a little brighter on female role models in IT, Tech & Digital, and to empower each other through this inner network community.

Read More

Check out our latest news

Testimonials

Geert Goethals
Geert Goethals
CIO
Sibelga
Bahadir Samli
Bahadir Samli
CIO
ING Belgique
2-Feb-29-2024-11-35-00-9309-AM
Bart Kerkhofs
Untitled design (1)-Apr-01-2022-10-58-34-57-AM
Michał Paprocki
Group CIO
Euroclear
1-Feb-29-2024-11-34-59-8990-AM
Manfred Boudreaux-Dehmer
Chief Information Officer
NATO
Untitled design-Nov-22-2023-08-42-05-3178-AM
Annick Faes
Vice President IT and CIO Medical Devices EMEA
Johnson & Johnson
Piet_De_Ceuleners
Piet De Ceuleners
Global IT Director
Melexis
1658251930890
Dirk De Bevere
Large Enterprise Sales Leader
Telenet Business
Untitled design-7
Stef Schampaert
Country Managing Director BeLux
Red Hat
CIONET Belgium - Advisory Board Member - Geert Lejon
Geert Lejon
Vice President Head of Belux / Head of Comms Benelux
Cognizant
Kevin_Ledegen
Kevin Ledegen
Group IT director
SDWorx
Gunter-Van-Craen_Small
Gunter Van Craen
Chief Digital & Information Officer
Bekaert
Thomas Kessler
Thomas Kessler
Partner | CIO Programme Leader
Deloitte
Emmanuel Gob
Emmanuel Gob
CIO
DPD
pascal pauwels
Pascal Pauwels
CIO
Colruyt
Untitled design (4)-Dec-13-2023-10-53-15-5032-AM
Koen Segers
Managing Director Belgium and Luxembourg
Dell Technologies
benoit dewaele
Benoît Dewaele
Group IT Directo
Vandemoortele
Dirk Deridder-1
Dirk Deridder
CTO - Technology Services & Practices
SMALS
Thierry Driesens
Thierry Driesens
CIO
TVH
Untitled design-Sep-18-2023-11-59-29-7866-AM
Koen Vandaele
CIO
Delen Private Bank
Untitled design (4)-Jun-12-2023-01-23-11-7540-PM
Liesbet D'hoker
Managing Director
Kyndryl BeLux
steven-vermeulen
Steven Vermeulen
CIO
Digitaal Vlaanderen
Jack Hamande
Jack Hamande
Director General Digital Transformation
Federale Overheidsdienst Beleid en Ondersteuning
Tom Tomczak
Tom Tomczak
Chief Commercial Officer (CCO)
NRB
1726588748718
Cassandre Laurent
Directeur général
Agence du Numérique
an swalens
An Swalens
Head Of IT (CIO)
National Bank of Belgium
Untitled design (2)-Apr-01-2022-10-58-34-68-AM
Elke Laeremans
Chief Technology & Transformation Officer
Krëfel
CIONET Belgium - Advisory Board Member - Koen Van Loo
Koen Van Loo
CIO
Group S.
Peter Sany
Peter Sany
Executive Advisor
Zoom
CIONET Belgium - Advisory Board Member - Steven De Haes
Steven De Haes
Dean
Antwerp Management School
Marleen Thorré
Marleen Thorré
christel-plessers
Christel Plessers
Head of IT European Markets
Mercedes-Benz Europe
bauduin cor
Baudouin Corlùy
Chief Market Development Officer
LCL Data Centers

Team

Luc Hendrikx
Luc Hendrikx
Partner - CEO
Inès De Bien
Inès De Bien
Partner - CCO
1-Feb-08-2022-10-22-08-68-AM
Daniel Eycken
Partner - COO
Hendrik Deckers
Hendrik Deckers
Partner - Founder
Untitled design (1)-2
Jelte Scheys
Tribes Sales Director Belgium
foto Herman
Herman Roelandts
Tribe Master
Joseph Antoun
Joseph Antoun
Senior Programme Director
1-Dec-16-2021-02-15-57-02-PM
Eman De Sutter
Programme Manager
4-Feb-08-2022-10-22-09-03-AM
Shelly Deracourt
Programme Manager
Untitled design (5)-Sep-01-2022-02-47-55-60-PM
Charlotte Coen
Partner Success Manager
Untitled design (1)-Nov-22-2023-08-56-42-6802-AM
Ivana Bradvica
Programme Manager
Vlera Berishaa (1)
Vlera Berisha
Community Manager
ML B-W-1
Martine Lefevre
Financial Controller

Contact us

Would you like to know more about CIONET Belgium, membership or partnership opportunities? Do you have feedback or any other question? Send us a message!